1. Barnes, J., Chapman, R., Johnson, R., Widmaier, J., Cooper, D., Everett, B.: Engineering the Tokeneer enclave protection software. In: Proceedings of IEEE International Symposium on Secure Software Engineering (ISSSE) (2006)
2. Bishop, P.G., Bloomfield, R.E.: A methodology for safety case development. In: Redmill, F., Anderson, T. (eds.) Industrial Perspectives of Safety-Critical Systems, pp. 194–204. Springer, London (1998).
https://doi.org/10.1007/978-1-4471-1534-2_14
3. Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence);JC Blanchette,2011
4. Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence);AD Brucker,2018
5. Common Criteria Consortium: Common criteria for information technology security evaluation - part 1: introduction and general model. Technical report CCMB-2017-04-001 (2017).
https://www.commoncriteriaportal.org